-
1
-
-
85024585723
-
Incremental cryptography: The case of hashing and signing
-
Springer-Verlag LNCS 839
-
M. Bellare, O. Goldreich and S. Goldwasser. Incremental Cryptography: The Case of Hashing and Signing. In Advances in Cryptology (CRYPTO), Springer-Verlag LNCS 839, 216-233, 1994.
-
(1994)
Advances in Cryptology (CRYPTO)
, pp. 216-233
-
-
Bellare, M.1
Goldreich, O.2
Goldwasser, S.3
-
2
-
-
0042917398
-
A new paradigm for collision-free hashing: Incrementality at reduced cost
-
Springer-Verlag LNCS 1233
-
M. Bellare and, D. Micciancio. A New Paradigm for Collision-Free Hashing: Incrementality at Reduced Cost. In Advances in Cryptology (EUROCRYPT), Springer-Verlag LNCS 1233, 163-192, 1997.
-
(1997)
Advances in Cryptology (EUROCRYPT)
, pp. 163-192
-
-
Bellare, M.1
Micciancio, D.2
-
3
-
-
84903595110
-
Differential cryptanalysis of DES-like cryptosystems
-
Springer-Verlag LNCS 537
-
E. Biham and A. Shamir. Differential Cryptanalysis of DES-like Cryptosystems. In Advances in Cryptology (CRYPTO), Springer-Verlag LNCS 537, 2-21, 1990.
-
(1990)
Advances in Cryptology (CRYPTO)
, pp. 2-21
-
-
Biham, E.1
Shamir, A.2
-
4
-
-
84887273894
-
Multi-dimensional montgomery ladders for elliptic curves
-
D. R. L. Brown. Multi-Dimensional Montgomery Ladders for Elliptic Curves. IACR eprint, 2006/220, 2006.
-
(2006)
IACR Eprint, 2006/220
-
-
Brown, D.R.L.1
-
5
-
-
84937564555
-
Software implementation of the NIST elliptic curves over prime fields
-
D. Naccache, editor Springer-Verlag
-
M. Brown, D. Hankerson, J. López, and A. Menezes. Software implementation of the NIST elliptic curves over prime fields. In D. Naccache, editor, CT-RSA'01, Volume 2020 of Lecture Notes in Computer Science, pages 250-265. Springer-Verlag, 2001.
-
(2001)
CT-RSA'01, Volume 2020 of Lecture Notes in Computer Science
, pp. 250-265
-
-
Brown, M.1
Hankerson, D.2
López, J.3
Menezes, A.4
-
6
-
-
33746095782
-
VSH, an efficient and provable collision resistant hash function
-
S. Vaudenay, editor Springer-Verlag
-
S. Contini, A. K. Lenstra, and R. Steinfeld. VSH, an efficient and provable collision resistant hash function. In S. Vaudenay, editor, Advances in Cryptography - Euro'06, Volume 4004 of Lecture Notes in Computer Science, pages 165-182. Springer-Verlag, 2006.
-
(2006)
Advances in Cryptography - Euro'06, Volume 4004 of Lecture Notes in Computer Science
, pp. 165-182
-
-
Contini, S.1
Lenstra, A.K.2
Steinfeld, R.3
-
8
-
-
85028868533
-
Collision free hash functions and public key signature schemes
-
Springer-Verlag LNCS 304
-
I.B. Damgård. Collision Free Hash Functions and Public Key Signature Schemes. In Advances in Cryptology (EUROCRYPT), Springer-Verlag LNCS 304, 203-216, 1987.
-
(1987)
Advances in Cryptology (EUROCRYPT)
, pp. 203-216
-
-
Damgård, I.B.1
-
10
-
-
24144449163
-
A comparison of ceilidh and xtr
-
D. Buell, editor Springer-Verlag
-
R. Granger, D. Page, and M. Stam. A comparison of ceilidh and xtr. In D. Buell, editor, ANTS-VI, Volume 3076 of Lecture Notes in Computer Science, pages 235-249. Springer-Verlag, 2004.
-
(2004)
ANTS-VI, Volume 3076 of Lecture Notes in Computer Science
, pp. 235-249
-
-
Granger, R.1
Page, D.2
Stam, M.3
-
12
-
-
84957881669
-
Using cyclotomic polynomials to construct efficient discrete logarithm cryptosystems over finite fields
-
V. Varadharajan, J. Pieprzyk, and Y. Mu, editors Springer-Verlag
-
A. K. Lenstra. Using cyclotomic polynomials to construct efficient discrete logarithm cryptosystems over finite fields. In V. Varadharajan, J. Pieprzyk, and Y. Mu, editors, ACISP'97, Volume 1270 of Lecture Notes in Computer Science, pages 127-138. Springer-Verlag, 1997.
-
(1997)
ACISP'97, Volume 1270 of Lecture Notes in Computer Science
, pp. 127-138
-
-
Lenstra, A.K.1
-
13
-
-
84974628135
-
The XTR public key system
-
M. Bellare, editor Springer-Verlag
-
A. K. Lenstra and E. R. Verheul. The XTR public key system. In M. Bellare, editor, Advances in Cryptography - Crypto'00, Volume 1880 of Lecture Notes in Computer Science, pages 1-19. Springer-Verlag, 2000.
-
(2000)
Advances in Cryptography - Crypto'00, Volume 1880 of Lecture Notes in Computer Science
, pp. 1-19
-
-
Lenstra, A.K.1
Verheul, E.R.2
-
14
-
-
85025704284
-
Cryptanalysis method for DES cipher
-
Springer-Verlag LNCS 765
-
M. Matsui Linear Cryptanalysis Method for DES Cipher. In Advances in Cryptology (EUROCRYPT), Springer-Verlag LNCS 765, 386-397, 1993.
-
(1993)
Advances in Cryptology (EUROCRYPT)
, pp. 386-397
-
-
Matsui Linear, M.1
-
15
-
-
0025545583
-
A fast software one-way hash function
-
R.C. Merkle. A Fast Software One-way Hash Function. Journal of Cryptology, 3, 43-58, 1990.
-
(1990)
Journal of Cryptology
, vol.3
, pp. 43-58
-
-
Merkle, R.C.1
-
19
-
-
35248854585
-
Efficient subgroup exponentiation in quadratic and sixth degree extensions
-
J. Burton S. Kaliski, Ç. KoÇ, and C. Paar, editors Springer-Verlag
-
M. Stam and A. K. Lenstra. Efficient subgroup exponentiation in quadratic and sixth degree extensions. In J. Burton S. Kaliski, Ç. KoÇ, and C. Paar, editors, CHES'02, Volume 2523 of Lecture Notes in Computer Science, pages 318-332. Springer-Verlag, 2003.
-
(2003)
CHES'02, Volume 2523 of Lecture Notes in Computer Science
, pp. 318-332
-
-
Stam, M.1
Lenstra, A.K.2
-
20
-
-
33745122987
-
Efficient collision search attacks on SHA-0
-
Springer-Verlag LNCS 3621
-
X. Wang, H. Yu, and Y. L. Yin. Efficient Collision Search Attacks on SHA-0. In Advances in Cryptology (CRYPTO), Springer-Verlag LNCS 3621, 1-16, 2005.
-
(2005)
Advances in Cryptology (CRYPTO)
, pp. 1-16
-
-
Wang, X.1
Yu, H.2
Yin, Y.L.3
-
21
-
-
33646754186
-
Finding collisions in the full SHA-1
-
Springer-Verlag LNCS 3621
-
X. Wang, Y. Yin, H. Yu. Finding Collisions in the Full SHA-1. In Advances in Cryptology (CRYPTO), Springer-Verlag LNCS 3621, 7-36, 2005.
-
(2005)
Advances in Cryptology (CRYPTO)
, pp. 7-36
-
-
Wang, X.1
Yin, Y.2
Yu, H.3
|